ROSITA: Towards automatic elimination of power-analysis leakage in ciphers

Madura A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

25 Citations (Scopus)

Abstract

Since their introduction over two decades ago, side-channel attacks have presented a serious security threat. While many ciphers' implementations employ masking techniques to protect against such attacks, they often leak secret information due to unintended interactions in the hardware. We present ROSITA, a code rewrite engine that uses a leakage emulator which we amend to correctly emulate the micro-architecture of a target system. We use ROSITA to automatically protect masked implementations of AES, ChaCha, and Xoodoo. For AES and Xoodoo, we show the absence of observable leakage at 1 000 000 traces with less than 21% penalty to the performance. For ChaCha, which has significantly more leakage, ROSITA eliminates over 99% of the leakage, at a performance cost of 64%.

Original languageEnglish
Title of host publicationProceedings 2021, 28th Network and Distributed System Security Symposium
EditorsDavid Balenson
Place of PublicationReston VA USA
PublisherThe Internet Society
Number of pages17
ISBN (Electronic)1891562665, 9781891562662
DOIs
Publication statusPublished - 2021
Externally publishedYes
EventUsenix Network and Distributed System Security Symposium 2021 - Online, San Diego, United States of America
Duration: 21 Feb 202125 Feb 2021
https://www.ndss-symposium.org/ndss2021/
https://www.ndss-symposium.org/ndss-program/ndss-2021/ (Proceedings)

Conference

ConferenceUsenix Network and Distributed System Security Symposium 2021
Abbreviated titleNDSS 2021
Country/TerritoryUnited States of America
CitySan Diego
Period21/02/2125/02/21
Internet address

Cite this